In this paper, we first give a new set of design goals for anonymous two-factor authentication scheme. The new set is a refinement of some previously proposed requirement sets;it not only eliminates the redundancies, ...
详细信息
In this paper, we first give a new set of design goals for anonymous two-factor authentication scheme. The new set is a refinement of some previously proposed requirement sets;it not only eliminates the redundancies, conflicts and ambiguities of the old ones, but also provides more desired security properties. Then we demonstrate that both of Sun et al.'s scheme and Li et al.'s scheme fail to satisfy all the security goals we propose. Specifically, we point out that Sun et al.'s scheme still suffers from the smart card loss problem and fails to provide user untraceability. Li et al.'s scheme is vulnerable to desynchronization attack. In order to remedy these defects in their schemes, we propose a robust two-factor authentication and key agreement scheme with user privacy preservation achieving all the goals we present. Compared with the previous schemes, our scheme not only provides more security guarantees, but also is still efficient both in computation and communication cost.
Mobile Ad Hoc network security is facing tougher challenges due to emerging purposive strategic attacks conducted by smart malicious nodes. All these purposive strategic attacks run out of the throughput which results...
详细信息
In this paper, we consider multiple primary and multiple secondary users cooperative cognitive radio networks, in which the primary users (PUs) lease a portion of their spectrum to the secondary users (SUs) for some r...
详细信息
Dual satellite TDOA/FDOA localization scheme has problems of multiple ambiguous solutions and poor localization results in the sub-satellite area along the dual satellite baseline direction. Passive localization using...
详细信息
Particle systems are important building block for simulating vivid and detail-rich effects in virtual *** of the most difficult aspects of particle systems has been detecting collisions between particles and mesh *** ...
详细信息
Particle systems are important building block for simulating vivid and detail-rich effects in virtual *** of the most difficult aspects of particle systems has been detecting collisions between particles and mesh *** to the huge computation,a variety of proxy-based approaches have been proposed recently to perform visually correct ***,all either limit the complexity of the scene,fail to guarantee non-penetration,or are too slow for real-time use with many *** this paper,we propose a new octree-based proxy for colliding particles with meshes on the *** approach works by subdividing the scene mesh with an octree in which each leaf node associates with a representative normal corresponding to the normals of the triangles that intersect the *** present a view-visible method,which is suitable for both closed and non-closed models,to label the empty leaf nodes adjacent to nonempty ones with appropriate back/front property,allowing particles to collide with both sides of the scene *** show how collisions can be performed robustly on this proxy structure in place of the original mesh,and describe an extension that allows for fast traversal of the octree structure on the *** experiments show that the proposed method is fast enough for real-time performance with millions of particles interacting with complex scenes.
There are some critical nodes in Ad Hoc networks, and the failure of these critical nodes can critically affect the performance of the network. For the aim of selecting the important and trusted critical nodes in Ad H...
详细信息
According to the gridded discrete processing method, the laser echo characteristics in the case of ladder terrain ground are analyzed theoretically, and the ladder-like terrain echo mathematical model are established....
详细信息
A micro-hole fabrication scheme based on focus-shaped radially polarized beams is presented. First, a micro-hole fabrication system is demonstrated based on the focus shaping of radially polarized beams, where a high ...
详细信息
In the existing adaptively secure ABE (attribute-based encryption) schemes, the decryption cost goes linearly with the number of attributes that are used in decryption. An adaptively secure key-policy ABE (FKP-ABE) sc...
详细信息
A novel method to generate cylindrical vector beams is presented based on a cat-eye cavity laser and a Mach-Zehnder interferometric arrangement. Some transverse modes can be generated by the cat-eye cavity laser and t...
详细信息
暂无评论